CN110597460A - Method for completely removing residual information of disk - Google Patents
Method for completely removing residual information of disk Download PDFInfo
- Publication number
- CN110597460A CN110597460A CN201910733477.3A CN201910733477A CN110597460A CN 110597460 A CN110597460 A CN 110597460A CN 201910733477 A CN201910733477 A CN 201910733477A CN 110597460 A CN110597460 A CN 110597460A
- Authority
- CN
- China
- Prior art keywords
- file
- message queue
- message
- work
- subprocess
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0643—Management of files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/0652—Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention has proposed a method for clearing the surplus information of the magnetic disc completely, this method disposes the executable file on the server, set up the message queue sequentially through carrying out the scheduling process, set up several work subprocesses, according to the file system that the input scanning file system of the order row parameter needs to be cleared completely, and load the file route into the message queue for the work subprocess to process; the scheduling process communicates with the worker subprocess through a message queue. The worker subprocess firstly reads a file path loaded into the message queue by the scheduling process to find a file path of the file system needing to be thoroughly cleared, then calls a shred command, overwrites the file of the file system needing to be thoroughly cleared, so that the file of the file system needing to be thoroughly cleared cannot be recovered, and finally crushes the file. The invention uses the shred command to thoroughly clear the residual information of the disk, is safe and reliable, protects the sensitive information of the disk and provides the system security.
Description
Technical Field
The invention belongs to the technical field of servers, and particularly relates to a method for completely removing residual information of a disk.
Background
In the basic requirements for information security technology information system security level protection, requirements for remaining information protection are provided in information systems of three or more levels. The specific requirements for protecting the disk residual information are as follows: it should be ensured that the memory and storage space used by the virtual machine is completely cleared when it is recovered.
However, for most systems or websites using the Linux operating system, an rm command is commonly used for deleting sensitive files and directories, but the rm command only deletes the index point pointing to the data block and does not destroy or delete the data in the data block, so that before the data block is not written again, data recovery operations can be performed by using a specific data recovery technology (such as a diagnostic program, power analysis, optical reading, data recovery software, and the like), which cannot meet the requirement of remaining information protection. And the requirement of company information safety protection cannot be met.
Disclosure of Invention
The invention provides a method for completely removing disk residual information, which arranges an executable file program on a server and completely removes the disk residual information through a scheduling process and work to achieve the purpose of protecting the disk residual information. And sensitive information of the system is protected, and the safety of the system is improved.
In order to achieve the above object, the present invention provides a method for completely removing disk remaining information, the method comprising:
sequentially creating a message queue, creating a plurality of work subprocesses, scanning a file system needing to be thoroughly cleared in the file system according to the input of command line parameters, and loading a file path into the message queue for the work subprocesses to process by executing a scheduling process; the scheduling process communicates with a plurality of work subprocesses through the created message queue;
the method comprises the steps that a worker sub-process firstly reads a file path loaded into a message queue by a scheduling process to find a file path of a file system needing to be thoroughly cleared, then a shred command is called, the file of the file system needing to be thoroughly cleared is overwritten, the file of the file system needing to be thoroughly cleared cannot be recovered, and finally the file is smashed.
Further, the method also comprises the steps of storing operation steps and operation results in the scheduling process and the work subprocess into a log system, setting the maximum value of log files in the log system, and when the number of the log files is larger than the maximum value of the log files, moving the log files into a backup directory to form new log files.
Further, the log file comprises file clearing time, a file clearing path, a file clearing result and file clearing time.
Further, the scheduling process uses the msgget function to create a new message queue or acquire an existing message queue, returns an identifier msqID uniquely identifying the message queue, and then uses the message queue marked by the identifier to perform communication between the scheduling process and the worker sub-process.
Further, the scanning a file system to be completely cleared in the file system according to the input of the command line parameter and loading the file path into the message queue for the work subprocess includes:
if the input parameter is a file, directly loading the file path into a message queue for processing by a work subprocess;
if the input parameter is a folder, scanning the content under the folder, and loading the file path under the folder into a message queue; for the subfolders under the folder, continuing to scan the subfolders, and loading file paths under the subfolders into a message queue; and for the link files under the folder, no processing is performed.
Further, the scheduling process uses the msgsnd function, sends a message by using a message queue identifier msqID, and loads a file path into a message queue; the mtext array stores a file path; mtype field storing message type; and the work subprocess reads respective message structural bodies according to the message types.
Furthermore, the message types comprise two forms, the first form is that all the content message types are consistent, and the work subprocess reads the message structure body in a preemptive manner; the second is that the message type is the remainder is the message type by the total document number to the work subprocess number, and the work subprocess reads the message structure according to the respective process serial number.
Further, after the sub-process is created, a message structure is received by using a message queue identifier msgID using an msgrcv function, wherein a message type is specified according to an msgtyp parameter in the msgrcv function.
Further, a shred command is called, and the files of the file system needing to be thoroughly cleared are overwritten by 0, 1 and random numbers, so that the files of the file system needing to be thoroughly cleared cannot be restored; and then, using a shred command to crush the file or using the disk to crush the file.
The effect provided in the summary of the invention is only the effect of the embodiment, not all the effects of the invention, and one of the above technical solutions has the following advantages or beneficial effects:
the embodiment of the invention provides a method for completely removing residual information of a disk, which comprises the steps of deploying executable file programs (executables) on a server, sequentially creating a message queue, creating a plurality of work subprocesses, scanning a file system needing to be completely removed in the file system according to the input of command line parameters by executing a scheduling process, and loading a file path into the message queue for the work subprocesses to process; the scheduling process communicates with several worker sub-processes through the created message queue. The worker subprocess firstly reads a file path loaded into the message queue by the scheduling process to find a file path of the file system needing to be thoroughly cleared, then calls a shred command, overwrites the file of the file system needing to be thoroughly cleared, so that the file of the file system needing to be thoroughly cleared cannot be recovered, and finally crushes the file. The method also comprises the steps of storing operation steps and operation results in the scheduling process and the work subprocess into the log system, setting the maximum value of the log files in the log system, and moving the log files into the backup directory to form new log files when the number of the log files is larger than the maximum value of the log files. The log file comprises file clearing time, a file clearing path, a file clearing result and file clearing time, and the clearing operation process and the clearing result are convenient to check at the later stage. The method for completely removing the disk residual information provided by the embodiment of the invention uses the shred command of the file shredding tool carried by the Linux to completely remove the disk residual information, is safe and reliable, protects the disk sensitive information and provides system safety. The shred tool overwrites a disk file, and if the number of times of overwriting is large, the process is time-consuming. The tool adopts a mode of combining a scheduling process and a working process, parallelizes the overwriting process of the disk file and greatly improves the complete clearing speed. The final form of the invention is executable file which can run on Linux system, it can be used alone, it can integrate the tool into other modules and systems, it can start the tool by using system command in the project code, it is simple to integrate.
Drawings
Fig. 1 is a general architecture diagram of a method for completely removing residual information from a disk according to embodiment 1 of the present invention;
fig. 2 is a flowchart illustrating a scheduling process in a method for completely removing disk remaining information according to embodiment 1 of the present invention;
fig. 3 is a flowchart of a work subprocess in a method for completely removing disk remaining information according to embodiment 1 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, are merely for convenience of description of the present invention, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention.
Example 1
The embodiment 1 of the invention provides a method for completely removing residual information of a disk. The method includes deploying executable files of an executable file program on a server, sequentially creating a message queue, creating a plurality of work subprocesses, scanning a file system needing to be thoroughly cleared in the file system according to input of command line parameters and loading a file path into the message queue for the work subprocesses to process by executing a scheduling process; the scheduling process communicates with several worker sub-processes through the created message queue.
The worker subprocess firstly reads a file path loaded into the message queue by the scheduling process to find a file path of the file system needing to be thoroughly cleared, then calls a shred command, overwrites the file of the file system needing to be thoroughly cleared, so that the file of the file system needing to be thoroughly cleared cannot be recovered, and finally crushes the file.
The method also comprises the steps of storing the operation steps and the operation results in the scheduling process and the work subprocess into the log system, setting the maximum value of the log files in the log system, and moving the log files into the backup catalog to form new log files when the number of the log files is greater than the maximum value of the log files. The log file includes but is not limited to file removal time, file removal path, file removal result, and file removal time.
Fig. 1 is a general architecture diagram of a method for completely clearing residual information of a disk according to embodiment 1 of the present invention. Only one scheduling process is used for scanning directories and files to be subjected to complete clearing operation in the file system; there may be more than one work sub-process, and the specific number is determined according to the command line parameters. The scheduling process and the worker subprocess complete the transmission of the directories and the files which need to execute the complete clearing operation through the Message Queue. The architecture also comprises a Log System, and key step operations and results of the scheduling process and the work subprocess are stored in different Log files, so that the clearing operation process and the results can be conveniently checked at the later stage. The shred tool is a file crushing tool carried by a Linux system, and the method for completely removing the residual information of the disk, which is provided by the embodiment of the invention, can realize a set of complete file crushing programs by self and can also directly call the shred tool to complete the complete removal operation of the file, so that the purpose of protecting the residual information of the disk is achieved.
The scheduling process is a main process of the whole executable file, and sequentially creates a message queue, a fork work subprocess, a scanning file system and file information to be loaded into the message queue.
System V IPC introduces 3 interprocess communication modes, which are respectively: message queues, semaphores, and shared memory. The method for completely removing the disk residual information mainly uses the message queue therein for message interaction between the scheduling process and the work subprocess. The scheduling process uses the msgget function to create a new message queue or acquire an existing message queue, returns an identifier msqID uniquely identifying the message queue, and then uses the identifier marked message queue to perform communication between the scheduling process and the worker sub-process.
Each message in the message queue consists of two parts, respectively, the message type: the put process and the read process are used for identifying the message; message content: the real information content, what this CBB module puts is the file path.
The scheduling process is responsible for putting messages into the message queue; the worker subprocess is responsible for fetching messages in the message queue. The message type is agreed in advance by the scheduling process and the work subprocess. The problem of inconsistent message types of putting and taking is avoided, and abnormal conditions such as message queue blockage or idle work process and the like are avoided.
In order to improve the speed of completely removing the residual information of the disk, the CBB module uses multiple processes to simultaneously work, a work subprocess is created by a scheduling process fork of the CBB module, and the number of the created work subprocesses is determined by a command line parameter.
The scheduling process scans a file system needing to be thoroughly cleared in the file system according to the input of the command line parameters and loads a file path into a message queue for processing by a work subprocess, and if the input parameters are files, the file path is directly loaded into the message queue for processing by the work subprocess; if the input parameter is a folder, scanning the content under the folder, and loading the file path under the folder into a message queue; for the subfolders under the folder, continuing to scan the subfolders, and loading file paths under the subfolders into a message queue; and for the link files under the folder, no processing is performed.
A scheduling process uses an msgsnd function, sends a message by using a message queue identifier msqID, and loads a file path into a message queue; the mtext array stores a file path; mtype field storing message type; and the work subprocess reads respective message structure bodies according to the message types. The message types comprise two forms, the first form is that all the content message types are consistent, and the work subprocess reads the message structure body in a preemptive manner; the second is that the message type is the remainder is the message type by the total document number to the work subprocess number, and the work subprocess reads the message structure according to the respective process serial number. The specific method used may be selected according to performance, ease of implementation, and the like.
The work subprocesses are all subprocesses of the scheduling process, and the scheduling process waits for all the work subprocesses to finish tasks after scanning the file system and loading information. And after all the work subprocesses are finished, the scheduling process deletes all the folders.
Fig. 2 is a flowchart illustrating a scheduling process in a method for completely removing disk remaining information according to embodiment 1 of the present invention;
in step S201, the process starts;
in step S202, a message queue is created;
in step S203, the Fork work sub-process;
in step S204, scanning the file system, if the input parameter is a file, performing step S205, if the input parameter is a folder, scanning the content under the folder, then performing step S205, for the subfolders under the folder, continuing to perform scanning of the subfolders, and performing step S205 on the file paths under the subfolders; and for the link files under the folder, no processing is performed.
In step S205, the file path is loaded into the message queue;
in step S206, waiting for all work subprocesses to finish;
in step S207, the folder and its subfolders are deleted;
in step S208, the flow ends.
The work subprocess is a work module in the method for completely clearing the disk residual information, and after being created, the work subprocess uses an msgrcv function and receives a message structure by using a message queue identifier msgID, wherein the message type is specified according to an msgtyp parameter in the msgrcv function. The message types of the work subprocess exist in two modes, wherein the first mode is as follows: the msgtyp of all the working processes are consistent, and the working processes read the message structure body in a preemptive mode; the second way is: and the message type is the remainder of the work process number according to the total file number, the remainder is the message type, and the work processes read the message structure according to the respective process serial numbers. The specific method used may be selected according to performance, ease of implementation, and the like. Then, calling a shred command, and overwriting 0, 1 and random numbers on the files of the file system needing to be thoroughly cleared to ensure that the files of the file system needing to be thoroughly cleared cannot be restored; and then, using a shred command to crush the file or using the disk to crush the file.
Fig. 3 is a flowchart of a work subprocess in a method for completely removing disk remaining information according to embodiment 1 of the present invention.
In step S301, the process starts;
in step S302, a message queue message is read;
in step S303, a shred command is called;
in step S304, overwrite 0, 1 and random number to the file of the file system that needs to be completely cleared, and ensure that the file of the file system that needs to be completely cleared cannot be restored;
in step S305, it is determined whether there is data in the message queue, and if there is data, the process returns to step S302; if no data exists, executing step S306;
in step S306, the entire flow ends.
The invention provides a method for completely removing the residual information of a disk, which also comprises a log system used for recording the key operation steps and operation results of a scheduling process and a working process. The log is stored in a log file. Scheduling log naming rules: log _ schedule _ date, such as: log _ schedule _ 20190710. The working log naming rule is as follows: log _ work _ num _ date, where num is the work process sequence number, and the value is 1-n, then the work log name is, for example: log _ work _1_ 20190710. In the log system, the log file can be set with the maximum value of the log file, and when the log file is larger than the set maximum value, the original log file is moved to the backup catalog, and the log file is newly generated. Log record content includes, but is not limited to: file removal time, file removal path, file removal result, file removal time and the like.
The method for completely removing the residual information of the disk provided by the invention adopts a working mode of co-operation of a scheduling process, a work subprocess and a message queue, and can realize multifunctional development. The scheduling process is used for scheduling the process and scanning the task; the work subprocess is used for actually processing work; the scheduling process and the work subprocess interact through a message queue. The work process can read the message in the message queue through a preemptive strategy; and each work process has a unique message type in a unique identification mode, and a message structure body of the corresponding type is read from the message queue.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the present invention as defined in the accompanying claims.
Claims (9)
1. A method for completely removing disk remaining information, comprising:
sequentially creating a message queue, creating a plurality of work subprocesses, scanning a file system needing to be thoroughly cleared in the file system according to the input of command line parameters, and loading a file path into the message queue for the work subprocesses to process by executing a scheduling process; the scheduling process communicates with a plurality of work subprocesses through the created message queue;
the method comprises the steps that a worker sub-process firstly reads a file path loaded into a message queue by a scheduling process to find a file path of a file system needing to be thoroughly cleared, then a shred command is called, the file of the file system needing to be thoroughly cleared is overwritten, the file of the file system needing to be thoroughly cleared cannot be recovered, and finally the file is smashed.
2. The method according to claim 1, further comprising storing the operation steps and operation results in the scheduling process and the work subprocess in a log system, setting a maximum value of log files in the log system, and moving the log files to a backup directory to form new log files when the number of the log files is greater than the maximum value of the log files.
3. The method of claim 2, wherein the log file comprises a file removal time, a file removal path, a file removal result, and a file removal time.
4. The method for completely clearing the disk remaining information as claimed in claim 1, wherein the scheduling process uses msgget function to create a new message queue or obtain an existing message queue, and returns an identifier msqID uniquely identifying the message queue, and then uses the message queue marked by the identifier to perform communication between the scheduling process and the worker sub-process.
5. The method of claim 1, wherein scanning a file system requiring complete removal in the file system according to the input of the command line parameter and loading the file path into the message queue for the worker subprocess comprises:
if the input parameter is a file, directly loading the file path into a message queue for processing by a work subprocess;
if the input parameter is a folder, scanning the content under the folder, and loading the file path under the folder into a message queue; for the subfolders under the folder, continuing to scan the subfolders, and loading file paths under the subfolders into a message queue; and for the link files under the folder, no processing is performed.
6. The method for completely clearing the disk remaining information according to claim 1, wherein the scheduling process loads the file path into the message queue by using msgsnd function to send the message with the message queue identifier msqID; the mtext array stores a file path; mtype field storing message type; and the work subprocess reads respective message structural bodies according to the message types.
7. The method for completely removing the disk remaining information according to claim 6, wherein the message types include two types, the first type is that all the content message types are consistent, and the work subprocess reads the message structure body in a preemptive manner; the second is that the message type is the remainder is the message type by the total document number to the work subprocess number, and the work subprocess reads the message structure according to the respective process serial number.
8. The method for completely clearing the disk remaining information as claimed in claim 1, wherein the worker sub-process receives the message structure by using the message queue identifier msgID after being created, wherein the message type is specified according to the msgtyp parameter in the msgrcv function.
9. The method of claim 1, wherein the shred command is invoked to ensure that the file of the file system to be completely cleared is not restored by overwriting 0, 1 and random number on the file of the file system to be completely cleared; and then, using a shred command to crush the file or using the disk to crush the file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910733477.3A CN110597460A (en) | 2019-08-09 | 2019-08-09 | Method for completely removing residual information of disk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910733477.3A CN110597460A (en) | 2019-08-09 | 2019-08-09 | Method for completely removing residual information of disk |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110597460A true CN110597460A (en) | 2019-12-20 |
Family
ID=68853832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910733477.3A Withdrawn CN110597460A (en) | 2019-08-09 | 2019-08-09 | Method for completely removing residual information of disk |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110597460A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115102A (en) * | 2020-08-25 | 2020-12-22 | 广州锦行网络科技有限公司 | Method for cleaning remote login log records |
CN113254240A (en) * | 2021-06-21 | 2021-08-13 | 苏州浪潮智能科技有限公司 | Method, system, device and medium for managing control device |
-
2019
- 2019-08-09 CN CN201910733477.3A patent/CN110597460A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115102A (en) * | 2020-08-25 | 2020-12-22 | 广州锦行网络科技有限公司 | Method for cleaning remote login log records |
CN112115102B (en) * | 2020-08-25 | 2021-05-14 | 广州锦行网络科技有限公司 | Method for cleaning remote login log records |
CN113254240A (en) * | 2021-06-21 | 2021-08-13 | 苏州浪潮智能科技有限公司 | Method, system, device and medium for managing control device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7574440B2 (en) | Information processing apparatus, and method for retaining security | |
CN101425016B (en) | Method and system for operating and installing software | |
CN113779574B (en) | APT detection method based on context behavior analysis | |
CN104598823A (en) | Kernel level rootkit detection method and system in Andriod system | |
CN103988206A (en) | Method for the dynamic creation of an application execution environment for securing said application, and associated computer program product and computing device | |
CN110597460A (en) | Method for completely removing residual information of disk | |
CN110674109B (en) | Data importing method, system, computer equipment and computer readable storage medium | |
CN105229658B (en) | The safety device and safety method of data handling system | |
CN102693232B (en) | Method and device for cancelling files | |
CN100514305C (en) | System and method for implementing safety control of operation system | |
CN103067246A (en) | Method and apparatus used for processing file received based on instant communication service | |
CN100372307C (en) | Method for managing system log | |
CN118051910A (en) | Intelligent confusion method and system based on security section aiming at mobile terminal application | |
CN105453104B (en) | System protection file security control device and management method | |
CN107203410B (en) | VMI method and system based on system call redirection | |
CN111783094A (en) | Data analysis method and device, server and readable storage medium | |
CN103019865A (en) | Virtual machine monitoring method and system | |
EP0550369A2 (en) | Method and system for the automatic performance of a task within an object-oriented software system | |
CN103645967A (en) | Read-only snapshot rollback method and device | |
CN110221952B (en) | Service data processing method and device and service data processing system | |
CN114386044A (en) | Security testing method based on device driver dispatching function hook | |
CN107016054A (en) | A kind of method and device of log information storage | |
US7234142B1 (en) | Task processing system | |
CN112286876A (en) | Log file capturing method and device and computer readable storage medium | |
CN111291380A (en) | Command line reinforcing method, system, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20191220 |